Requiring reauthentication for new and expired sessions for a SAML SSO authentication service
To add an extra layer of security, you configure Pega Platform to reauthenticate new sessions and to reauthenticate when reactivating an expired session. The time-out period is specified on the operator's access group or is managed by the application server or another external facility.
Open the service from the navigation panel in Dev Studio by clickingand choosing a service from the instance list.
On the SAML 2.0 tab, expand the Advanced configuration settings section.
Select the Use access group timeout checkbox to use the authentication time-out values that are specified in the user access group. This setting determines how long user sessions can remain inactive before users are prompted to identify themselves again. Clear the Use access group timeout checkbox if the time-out is managed by the application server or another external facility.
To require reauthentication for new and reactivated sessions, select the Force authentication check box.
- Authentication services
To override or extend the default authentication process, create and configure an authentication service.
- More about authentication services
This page describes additional topics relevant to authentication services that are not directly referenced on the rule form.
- Configuring a SAML SSO authentication service
After you create a SAML SSO authentication service, configure it so that Pega Platform uses the specified identity provider for authenticating users. You can map attributes from the identity repository to properties in Pega Platform, and also configure optional features such as preauthentication and postauthentication activities and operator provisioning.